Page 492 of 5018 results (0.026 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

25 Nov 2005 — ip_conntrack_proto_icmp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via a message without ICMP ID (ICMP_ID) information, which leads to a null dereference. • http://marc.info/?l=linux-kernel&m=113269476307795&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 37EXPL: 0

23 Nov 2005 — The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges. • http://secunia.com/advisories/17786 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 2%CPEs: 37EXPL: 0

23 Nov 2005 — The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash). • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

22 Nov 2005 — Linux kernel before after 2.6.12 and before 2.6.13.1 might allow attackers to cause a denial of service (Oops) via certain IPSec packets that cause alignment problems in standard multi-block cipher processors. NOTE: it is not clear whether this issue can be triggered by an attacker. • http://bugzilla.kernel.org/show_bug.cgi?id=5194 •

CVSS: 9.1EPSS: 0%CPEs: 134EXPL: 1

20 Nov 2005 — The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table. • https://www.exploit-db.com/exploits/26489 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 35EXPL: 1

27 Oct 2005 — The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash). • https://www.exploit-db.com/exploits/26382 •

CVSS: 4.7EPSS: 1%CPEs: 3EXPL: 0

20 Oct 2005 — Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired. • http://lkml.org/lkml/2005/6/23/249 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 4%CPEs: 117EXPL: 0

20 Oct 2005 — The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.5EPSS: 0%CPEs: 31EXPL: 0

20 Oct 2005 — The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information. • http://linux.bkbits.net:8080/linux-2.6/cset%4042e81864gSEM90Oun0jA8dufpM3inw •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

18 Oct 2005 — The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using loadkeys. • https://www.exploit-db.com/exploits/26353 • CWE-264: Permissions, Privileges, and Access Controls •